June 12, 2019
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more â¶
How to disable basic authentication in Microsoft Office 365
6 ways malware can bypass endpoint protection
Review: LogRhythm takes SIEM to the next level
How to evaluate SOC-as-a-service providers
From phish to network compromise in two hours: How Carbanak operates
12 tips for effectively presenting cybersecurity to the board
In this presentation, we will obtain global perspective from Dan Thompson and Daniel Bizo from 451 Research as well as global executives from Iron Mountain Data Centers. Read more â¶
If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Read more â¶
DEALPOST
Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more â¶
Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more â¶
LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats ⦠and sometimes even pre-threat actions. Read more â¶
Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more â¶
Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more â¶
Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more â¶